The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more

On March 23, the Federal Reserve and the Office of the Comptroller of the Currency – both non-parties in the suit – filed briefs requesting that a district court reject a motion to compel discovery of over 30,000 documents...more

5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more

“There are only two types of companies left in the United States … those that have been hacked and those that don’t know they’ve been hacked.” That is how U.S. District Judge John E. Jones III of the Middle District of...more

The Federal Communications Commission’s (“FCC”) net neutrality proceeding culminated this month with the release of an Order reclassifying broadband Internet access service as a common carrier Telecommunications Service...more

So your client has been involved in motor vehicle collision. Now what? Whether representing a plaintiff or a defendant in a crash, preserving all potentially relevant evidence is an obvious first concern. What may not be so...more

One of this year’s themes at the South by Southwest (SxSW) festival is “Surviving the Shift: Rethinking Music and Data.” The music industry is transforming itself as the trend in buying music shifts from digital download to...more

Hillary Clinton is currently under fire for the use of a personal email account while United States Secretary of State. Mrs. Clinton apparently exclusively (or nearly exclusively) used her personal email account while...more

United Corporation v. Tutu Park Ltd., Inc., 2015 WL 457853 (V.I. Super. Jan. 28, 2015).
In this breach of contract case, the plaintiff asked the court to impose sanctions on Kmart, a non-party to the suit, and to hold...more

Data security breaches have become unfortunately prevalent amongst higher education institutions. In fact, colleges and universities suffer data breaches at a rate of just over one per week.(1) The Privacy Rights...more

On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more

A federal district court in New York has held that the attorney-client and work-product privileges apply to coverage memoranda sought by an insured from AIG Specialty Insurance in an ongoing coverage and bad faith litigation...more

Parsi v. Daioleslam, 2015 WL 525146 (D.C. Cir. Feb. 10, 2015).
In this appeal from a defamation case, the plaintiff sought the reversal of sanctions imposed by the district court. At trial, the plaintiff sought damages...more

You want to protect the identity of your business’ owners, but your opponent issued discovery requesting a copy of your organizational chart and/or information on the identities of your LLC members or LP partners. You are...more

Litigation, particularly complex litigation, can be just that, complex. The complexity of litigation necessarily requires the ability to manage multiple moving parts in all phases of a case in the most efficient and...more

We observed previously that “reasonably calculated” does not define scope of discovery, and it never has. Rather, discovery is limited, by the plain terms of F. R. Civ. P. 26, to “nonprivileged matter that is relevant to any...more